OLD | NEW |
| (Empty) |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "chrome/test/base/in_process_browser_test.h" | |
6 #include "content/public/browser/zygote_host_linux.h" | |
7 #include "content/public/common/sandbox_linux.h" | |
8 | |
9 typedef InProcessBrowserTest SandboxLinuxTest; | |
10 | |
11 // Both the SUID sandbox (http://crbug.com/137653) and the Seccomp-BPF sandbox | |
12 // are currently incompatible with ASan. | |
13 #if defined(OS_LINUX) && !defined(ADDRESS_SANITIZER) | |
14 #define MAYBE_SandboxStatus \ | |
15 SandboxStatus | |
16 #else | |
17 #define MAYBE_SandboxStatus \ | |
18 DISABLED_SandboxStatus | |
19 #endif | |
20 | |
21 IN_PROC_BROWSER_TEST_F(SandboxLinuxTest, MAYBE_SandboxStatus) { | |
22 // Get expected sandboxing status of renderers. | |
23 const int status = content::ZygoteHost::GetInstance()->GetSandboxStatus(); | |
24 | |
25 // The setuid sandbox is required as our first-layer sandbox. | |
26 bool good_layer1 = status & content::kSandboxLinuxSUID && | |
27 status & content::kSandboxLinuxPIDNS && | |
28 status & content::kSandboxLinuxNetNS; | |
29 // A second-layer sandbox is also required to be adequately sandboxed. | |
30 bool good_layer2 = status & content::kSandboxLinuxSeccompBPF; | |
31 | |
32 EXPECT_TRUE(good_layer1); | |
33 EXPECT_TRUE(good_layer2); | |
34 } | |
OLD | NEW |